SlideShare a Scribd company logo
Cloud Computing
Fundamentals and Applications
Dr Emiliano Reynares
ereynares@frsf.utn.edu.ar
“cloud computing was simply
a trap aimed at forcing more
people to buy into locked,
proprietary systems that
would cost them more and
more over time.”
Richard Stallman, founder of the Free Software
Foundation and creator of the computer operating
system GNU (2008)
“we've redefined cloud
computing to include everything
that we already do. I can't think
of anything that isn't cloud
computing […]. The computer
industry is the only industry that
is more fashion-driven than
women's fashion. Maybe I'm an
idiot, but I have no idea what
anyone is talking about. What is
it? It's complete gibberish. It's
insane. When is this idiocy
going to stop? [...] I don't
understand what we would do
differently in the light of cloud.”
Farber, Dan. Oracle’s CEO (2008)
Source: Wikipedia (English version)
A model for enabling:
1) ubiquitous
2) convenient, and
3) on-demand network access
to a shared pool of configurable computing resources that can be
rapidly provisioned and released with minimal management effort
Cloud Computing (NIST, 2011)
Source: NIST Definition of Cloud Computing (2011). NIST Cloud Computing Synopsis and Recommendations (2012)
Source: Wikipedia (English version)
1 of 5. On demand self-service
Cloud Computing
5 essential characteristics
2 of 5. Broad network access
Cloud Computing
5 essential characteristics
3 of 5. Resource pooling
Cloud Computing
5 essential characteristics
4 of 5. Rapid elasticity
Cloud Computing
5 essential characteristics
5 of 5. Measured service
Cloud Computing
5 essential characteristics
A collection of hardware and software that enables the
five essential characteristics of cloud computing
What’s cloud infrastructure?
1 of 3. Software as a Service (SaaS)
Cloud Computing
3 service models
2 of 3. Platform as a Service (PaaS)
Cloud Computing
3 service models
3 of 3. Infrastructure as a Service (IaaS)
Cloud Computing
3 service models
1 of 4. Private Cloud
Cloud Computing
4 deployment models
2 of 4. Community Cloud
Cloud Computing
4 deployment models
3 of 4. Public Cloud
Cloud Computing
4 deployment models
4 of 4. Hybrid Cloud
Cloud Computing
4 deployment models
cloud consumer or customer
A person or organization that is a customer of a cloud
client
A machine or software application that accesses a cloud over a
network connection
cloud provider or provider
An organization that provides cloud services
To clarify...
A technology that allows to create multiple simulated
environments or dedicated resources from a single
physical hardware system
Virtualization
Fundamental technology that powers cloud computing
Virtualization
1 of 3. Network Virtualization
Virtualization
Used for 3 purposes
2 of 3. Storage Virtualization
Virtualization
Used for 3 purposes
3 of 3. Server Virtualization
Virtualization
Used for 3 purposes
Main difference is that a true cloud provides self-service
capability, elasticity, automated management, scalability and
pay-as you go service that is not inherent in virtualization.
Cloud Computing versus
Virtualization
The use of widely distributed computer resources to reach a
common goal.
The grid can be thought of as a distributed system with non-
interactive workloads that involve a large number of files.
Grid Computing
Each node set to perform a different task/application.
Grid computers tend to be heterogeneous and geographically
dispersed.
Grids are often constructed with general-purpose grid middleware
software libraries.
Grid Computing
Source: https://setiathome.berkeley.edu/
Two original goals:
1. to do useful scientific work by supporting an observational
analysis to detect intelligent life outside Earth
2. to prove the viability and practicality of the "volunteer
computing" concept
SETI@home
A grid computing initiative
A service provisioning model in which a service provider makes
computing resources and infrastructure management available to the
customer as needed, and charges them for specific usage rather than
a flat rate
Utility Computing
1. Reliability
Probability that a system will produce correct outputs up to some
given time.
Cloud Computing “cons”
2. Availability of services and data
Probability that a system is operational at a given time, i.e. the
amount of time a device is actually operating as the percentage of
total time it should be operating.
Cloud Computing “cons”
3. Security
Protection of computer systems from theft or damage to their
hardware, software or electronic data, as well as from disruption or
misdirection of the services they provide.
Cloud Computing “cons”
4. Complexity
Cloud Computing “cons”
5. Costs
Cloud Computing “cons”
6. Regulations and legal issues
Cloud Computing “cons”
7. Performance
Amount of work accomplished by a computer system.
Cloud Computing “cons”
8. Migration
Involves moving software code or data from one platform to another,
minimizing reengineering.
Cloud Computing “cons”
9. Reversion
Drop of one or more recent changes in favor of a return to a previous
version of the material at hand.
Cloud Computing “cons”
10. The lack of standards
Cloud Computing “cons”
11. Limited customization
Cloud Computing “cons”
12. Privacy
Relationship between the collection and dissemination of data,
technology, and the public expectation of privacy, legal and political
issues surrounding them
Cloud Computing “cons”
A layered model for enabling ubiquitous access to a shared
continuum of scalable computing resources
Fog Computing
Source: NIST Fog Computing Conceptual Model. (https://doi.org/10.6028/NIST.SP.500-325)
Core component of the fog computing architecture.
Either physical components or virtual components, tightly coupled
with the smart end devices or access networks, and provide
computing resources to these devices.
Fog Node
1 of 6. Contextual location awareness, and low
latency
Fog Computing
6 essential characteristics
2 of 6. Geographical distribution
Fog Computing
6 essential characteristics
3 of 6. Heterogeneity
Fog Computing
6 essential characteristics
4 of 6. Interoperability and federation
Fog Computing
6 essential characteristics
5 of 6. Real-time interactions
Fog Computing
6 essential characteristics
6 of 6. Scalability and agility of federated, fog-node
clusters
Fog Computing
6 essential characteristics
1 of 3. Software as a Service (SaaS)
Fog Node
3 service models
2 of 3. Platform as a Service (PaaS)
Fog Node
3 service models
3 of 3. Infrastructure as a Service (IaaS)
Fog Node
3 service models
1 of 4. Private fog node
Fog Node
4 deployment models
2 of 4. Community fog node
Fog Node
4 deployment models
3 of 4. Public fog node
Fog Node
4 deployment models
4 of 4. Hybrid fog node
Fog Node
4 deployment models
Lightweight fog nodes
Mist Computing
Network layer encompassing the end devices and their users,
to provide, for example, local computing capability on a sensor,
metering or some other devices that are network-accessible.
It is also often referred to as IoT network.
Edge Computing
Fog computing runs applications in a multi-layer architecture that
decouples and meshes the hardware and software functions, allowing for
dynamic reconfigurations for different applications while performing
intelligent computing and transmission services.
Fog Computing versus
Edge Computing
Fog computing is hierarchical
In addition to computation and networking, fog computing also
addresses storage, control and data-processing acceleration.
Fog Computing versus
Edge Computing
Edge computing runs specific applications in a fixed logic location
and provides a direct transmission service.
Edge computing tends to be limited to a small number of peripheral
devices
Fog Computing versus
Edge Computing

More Related Content

What's hot

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
GAURAV SINHA
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
Rezgar Mohammad
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
Ankit Singh
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
HarshitParkar6677
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
IJERA Editor
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
Pachipulusu Giridhar
 
Cloud computing and Grid Computing
Cloud computing and Grid ComputingCloud computing and Grid Computing
Cloud computing and Grid Computing
prabathsl
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
Iffat Anjum
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Soumitra Halder
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
IJNSA Journal
 
Fog computing
Fog computingFog computing
Fog computing
Hadi Fadlallah
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
Usman Sait
 
From Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingFrom Cloud Computing to Edge Computing
From Cloud Computing to Edge Computing
Julien SIMON
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
Angelo Corsaro
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
Divyesh Shah
 
computing
computingcomputing
computing
Pappu Deepti
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
Ahmed Banafa
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
Jagan Mohan Bishoyi
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Bill Annibell
 

What's hot (20)

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Basic Overview Of Cloud Computing
Basic Overview Of Cloud ComputingBasic Overview Of Cloud Computing
Basic Overview Of Cloud Computing
 
Security and privacy issues of fog
Security and privacy issues of fogSecurity and privacy issues of fog
Security and privacy issues of fog
 
The Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud ComputingThe Security and Privacy Threats to Cloud Computing
The Security and Privacy Threats to Cloud Computing
 
Security and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A SurveySecurity and Privacy Issues of Fog Computing: A Survey
Security and Privacy Issues of Fog Computing: A Survey
 
Dn35636640
Dn35636640Dn35636640
Dn35636640
 
Fog Computing
Fog ComputingFog Computing
Fog Computing
 
Cloud computing and Grid Computing
Cloud computing and Grid ComputingCloud computing and Grid Computing
Cloud computing and Grid Computing
 
Fog computing ( foggy cloud)
Fog computing  ( foggy cloud)Fog computing  ( foggy cloud)
Fog computing ( foggy cloud)
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing and security issues in the
Cloud computing and security issues in theCloud computing and security issues in the
Cloud computing and security issues in the
 
Fog computing
Fog computingFog computing
Fog computing
 
Cloud Computing Documentation Report
Cloud Computing Documentation ReportCloud Computing Documentation Report
Cloud Computing Documentation Report
 
From Cloud Computing to Edge Computing
From Cloud Computing to Edge ComputingFrom Cloud Computing to Edge Computing
From Cloud Computing to Edge Computing
 
Smart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoTSmart, Secure and Efficient Data Sharing in IoT
Smart, Secure and Efficient Data Sharing in IoT
 
The seminar report on cloud computing
The seminar report on cloud computingThe seminar report on cloud computing
The seminar report on cloud computing
 
computing
computingcomputing
computing
 
What is fog computing
What is fog computingWhat is fog computing
What is fog computing
 
Seminar report on cloud computing
Seminar report on cloud computingSeminar report on cloud computing
Seminar report on cloud computing
 
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
 

Similar to Cloud Computing - Fundamentals and Applications

Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
Mayank Saxena
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
SiddhantPandey67
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
manoj kumar
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
Tony Godfrey
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
Sweta Kumari Barnwal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Monika Kumari
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
ProfRajivKumarShobhi
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Upanya Singh
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
Animesh Chaturvedi
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
Vamsi Krishna Vanama
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
UtkarshKumar608655
 
Cloud computing
Cloud computingCloud computing
Cloud computing
Nibi Maouriyan
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
Ahmed Abdisalan
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
Kingsley Mensah
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
Kannan Subbiah
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
Saransh Agarwal
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
Gopal Jogdand
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
ahmed elmeghiny
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
poojagupta010
 
Fog doc
Fog doc Fog doc
Fog doc
priyanka reddy
 

Similar to Cloud Computing - Fundamentals and Applications (20)

Cloud computing (2)
Cloud computing (2)Cloud computing (2)
Cloud computing (2)
 
akashgupta(2).pptx
akashgupta(2).pptxakashgupta(2).pptx
akashgupta(2).pptx
 
Cloud computing..
Cloud computing..Cloud computing..
Cloud computing..
 
htcia-5-2015
htcia-5-2015htcia-5-2015
htcia-5-2015
 
cloud computing basics
cloud computing basicscloud computing basics
cloud computing basics
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing.pptx
Cloud computing.pptxCloud computing.pptx
Cloud computing.pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Introduction to Cloud Computing
Introduction to Cloud ComputingIntroduction to Cloud Computing
Introduction to Cloud Computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 
NSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptxNSUT_Lecture1_cloud computing[1].pptx
NSUT_Lecture1_cloud computing[1].pptx
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Cloud computing presentation
Cloud computing presentationCloud computing presentation
Cloud computing presentation
 
A proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper companyA proposal for implementing cloud computing in newspaper company
A proposal for implementing cloud computing in newspaper company
 
Cloud computing – An Overview
Cloud computing – An OverviewCloud computing – An Overview
Cloud computing – An Overview
 
Cloud Computing introduction by saransh
Cloud Computing introduction by saranshCloud Computing introduction by saransh
Cloud Computing introduction by saransh
 
Cloud computings
Cloud computingsCloud computings
Cloud computings
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
Cloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigationsCloud computing pros and cons for computer forensic investigations
Cloud computing pros and cons for computer forensic investigations
 
Fog doc
Fog doc Fog doc
Fog doc
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 

Cloud Computing - Fundamentals and Applications

  • 1. Cloud Computing Fundamentals and Applications Dr Emiliano Reynares ereynares@frsf.utn.edu.ar
  • 2. “cloud computing was simply a trap aimed at forcing more people to buy into locked, proprietary systems that would cost them more and more over time.” Richard Stallman, founder of the Free Software Foundation and creator of the computer operating system GNU (2008)
  • 3. “we've redefined cloud computing to include everything that we already do. I can't think of anything that isn't cloud computing […]. The computer industry is the only industry that is more fashion-driven than women's fashion. Maybe I'm an idiot, but I have no idea what anyone is talking about. What is it? It's complete gibberish. It's insane. When is this idiocy going to stop? [...] I don't understand what we would do differently in the light of cloud.” Farber, Dan. Oracle’s CEO (2008)
  • 5. A model for enabling: 1) ubiquitous 2) convenient, and 3) on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort Cloud Computing (NIST, 2011) Source: NIST Definition of Cloud Computing (2011). NIST Cloud Computing Synopsis and Recommendations (2012)
  • 7. 1 of 5. On demand self-service Cloud Computing 5 essential characteristics
  • 8. 2 of 5. Broad network access Cloud Computing 5 essential characteristics
  • 9. 3 of 5. Resource pooling Cloud Computing 5 essential characteristics
  • 10. 4 of 5. Rapid elasticity Cloud Computing 5 essential characteristics
  • 11. 5 of 5. Measured service Cloud Computing 5 essential characteristics
  • 12. A collection of hardware and software that enables the five essential characteristics of cloud computing What’s cloud infrastructure?
  • 13. 1 of 3. Software as a Service (SaaS) Cloud Computing 3 service models
  • 14. 2 of 3. Platform as a Service (PaaS) Cloud Computing 3 service models
  • 15. 3 of 3. Infrastructure as a Service (IaaS) Cloud Computing 3 service models
  • 16. 1 of 4. Private Cloud Cloud Computing 4 deployment models
  • 17. 2 of 4. Community Cloud Cloud Computing 4 deployment models
  • 18. 3 of 4. Public Cloud Cloud Computing 4 deployment models
  • 19. 4 of 4. Hybrid Cloud Cloud Computing 4 deployment models
  • 20. cloud consumer or customer A person or organization that is a customer of a cloud client A machine or software application that accesses a cloud over a network connection cloud provider or provider An organization that provides cloud services To clarify...
  • 21. A technology that allows to create multiple simulated environments or dedicated resources from a single physical hardware system Virtualization
  • 22. Fundamental technology that powers cloud computing Virtualization
  • 23. 1 of 3. Network Virtualization Virtualization Used for 3 purposes
  • 24. 2 of 3. Storage Virtualization Virtualization Used for 3 purposes
  • 25. 3 of 3. Server Virtualization Virtualization Used for 3 purposes
  • 26. Main difference is that a true cloud provides self-service capability, elasticity, automated management, scalability and pay-as you go service that is not inherent in virtualization. Cloud Computing versus Virtualization
  • 27. The use of widely distributed computer resources to reach a common goal. The grid can be thought of as a distributed system with non- interactive workloads that involve a large number of files. Grid Computing
  • 28. Each node set to perform a different task/application. Grid computers tend to be heterogeneous and geographically dispersed. Grids are often constructed with general-purpose grid middleware software libraries. Grid Computing
  • 30. Two original goals: 1. to do useful scientific work by supporting an observational analysis to detect intelligent life outside Earth 2. to prove the viability and practicality of the "volunteer computing" concept SETI@home A grid computing initiative
  • 31. A service provisioning model in which a service provider makes computing resources and infrastructure management available to the customer as needed, and charges them for specific usage rather than a flat rate Utility Computing
  • 32. 1. Reliability Probability that a system will produce correct outputs up to some given time. Cloud Computing “cons”
  • 33. 2. Availability of services and data Probability that a system is operational at a given time, i.e. the amount of time a device is actually operating as the percentage of total time it should be operating. Cloud Computing “cons”
  • 34. 3. Security Protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide. Cloud Computing “cons”
  • 37. 6. Regulations and legal issues Cloud Computing “cons”
  • 38. 7. Performance Amount of work accomplished by a computer system. Cloud Computing “cons”
  • 39. 8. Migration Involves moving software code or data from one platform to another, minimizing reengineering. Cloud Computing “cons”
  • 40. 9. Reversion Drop of one or more recent changes in favor of a return to a previous version of the material at hand. Cloud Computing “cons”
  • 41. 10. The lack of standards Cloud Computing “cons”
  • 42. 11. Limited customization Cloud Computing “cons”
  • 43. 12. Privacy Relationship between the collection and dissemination of data, technology, and the public expectation of privacy, legal and political issues surrounding them Cloud Computing “cons”
  • 44. A layered model for enabling ubiquitous access to a shared continuum of scalable computing resources Fog Computing
  • 45. Source: NIST Fog Computing Conceptual Model. (https://doi.org/10.6028/NIST.SP.500-325)
  • 46. Core component of the fog computing architecture. Either physical components or virtual components, tightly coupled with the smart end devices or access networks, and provide computing resources to these devices. Fog Node
  • 47. 1 of 6. Contextual location awareness, and low latency Fog Computing 6 essential characteristics
  • 48. 2 of 6. Geographical distribution Fog Computing 6 essential characteristics
  • 49. 3 of 6. Heterogeneity Fog Computing 6 essential characteristics
  • 50. 4 of 6. Interoperability and federation Fog Computing 6 essential characteristics
  • 51. 5 of 6. Real-time interactions Fog Computing 6 essential characteristics
  • 52. 6 of 6. Scalability and agility of federated, fog-node clusters Fog Computing 6 essential characteristics
  • 53. 1 of 3. Software as a Service (SaaS) Fog Node 3 service models
  • 54. 2 of 3. Platform as a Service (PaaS) Fog Node 3 service models
  • 55. 3 of 3. Infrastructure as a Service (IaaS) Fog Node 3 service models
  • 56. 1 of 4. Private fog node Fog Node 4 deployment models
  • 57. 2 of 4. Community fog node Fog Node 4 deployment models
  • 58. 3 of 4. Public fog node Fog Node 4 deployment models
  • 59. 4 of 4. Hybrid fog node Fog Node 4 deployment models
  • 61. Network layer encompassing the end devices and their users, to provide, for example, local computing capability on a sensor, metering or some other devices that are network-accessible. It is also often referred to as IoT network. Edge Computing
  • 62. Fog computing runs applications in a multi-layer architecture that decouples and meshes the hardware and software functions, allowing for dynamic reconfigurations for different applications while performing intelligent computing and transmission services. Fog Computing versus Edge Computing
  • 63. Fog computing is hierarchical In addition to computation and networking, fog computing also addresses storage, control and data-processing acceleration. Fog Computing versus Edge Computing
  • 64. Edge computing runs specific applications in a fixed logic location and provides a direct transmission service. Edge computing tends to be limited to a small number of peripheral devices Fog Computing versus Edge Computing